IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsReports
201 - 225 of 943 Matches Previous Page  | Next Page
2014 Gartner Magic Quadrant for SIEM
sponsored by AlienVault
ANALYST BRIEF: Download the 2014 SIEM Gartner Magic Quadrant now to learn more about what makes AlienVault a SIEM Visionary.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

AlienVault

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
EGUIDE: This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach-detection issues.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Benefits of Threat Intelligence
sponsored by IBM
EGUIDE: This expert e-guide explores new technology that technology integrates threat intelligence and evaluates it against known system vulnerabilities for better prioritization of security controls.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Secure Mobile and Cloud Technologies Within the Enterprise
sponsored by BitGlass
WHITE PAPER: This resource highlights 5 critical characteristics to have in a unified security solution that will protect mobility and cloud initiatives.
Posted: 19 Jun 2014 | Published: 19 Jun 2014


Best Practices for Facing Today's Log Management Challenges
sponsored by Alert Logic
WHITE PAPER: This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Posted: 19 Jun 2014 | Published: 31 May 2012

Alert Logic

Leading the Charge in Emerging MSSPs
sponsored by Alert Logic
WHITE PAPER: In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Posted: 19 Jun 2014 | Published: 08 Jan 2013

Alert Logic

Information Security in the E-Commerce Sector
sponsored by Alert Logic
WHITE PAPER: This resource looks at information security in the e-commerce sector, and how standards like PCI enforce the strong need to protect consumer personal information.
Posted: 18 Jun 2014 | Published: 28 Feb 2014

Alert Logic

Surprising Research on the Evolving State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This resource aims to break the lingering assumption that the cloud is inherently less secure than an enterprise data center environment.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Alert Logic

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager
sponsored by Alert Logic
WHITE PAPER: In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Alert Logic

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET: This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014

Symantec Corporation

Defending Against Advanced Persistent Threats: Strategies for a New Era of Attacks
sponsored by CA Technologies.
WHITE PAPER: This guide takes a look at the growing risk of advanced persistent threats and what you can to prevent them.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

AccelOps Inc.

Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

Secure the Open Enterprise
sponsored by CA Technologies.
WHITE PAPER: This informative resource details the need for SaaS security and how to stop insider threats and external threats with the right SIEM solution.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

CA Technologies.

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security
201 - 225 of 943 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement